Jump to main content Jump to footer
Undefinierte dunkle Struktur

Manage your Information Security holistically

Akarion offers an individually adaptable software solution, which shows dependencies, automates processes, and supports you with pin-point precision.

Numerous industry leaders already use the Information Security Module.

Software Tour



Always keep an overview of the most important key figures, security incidents, open tasks and the latest changes made by your colleagues.

Holistic Compliance

  • Suche

    Meet standards and use
    synergy effects

    Import and maintain common standard and control sets and map them to each other.

  • Schild

    Document and protect information
    values and processes

    Collect your primary assets and define the appropriate protection requirements.

  • Austausch

    Illustrate connections clearly
    and accurately

    Define dependencies between different processes, assets and their protection requirements.

  • Schalter

    Adapt risk assessments to
    individual requirements

    Personalize protection objectives, risk matrices, legend texts and much more.

  • Bilder

    Make threats comprehensible and
    traceable with graphs

    The Information Security Module automatically generates interactive graphs based on your specifications.

  • Glocken

    Set automatable reminders for
    your audits

    Set parameters that trigger automatic notifications when met.

Drei Ebenen übereinander

Asset Management

The Information Security Module contains a pre-built methodology for gathering secondary assets and managing their corresponding risks.

In the course of this 3-step approach, which is based on the ISO 27005 standard, all the information collected - such as risks and measures - is passed on to the next level to enable a more efficient way of working. Of course, the documentation of your assets can also be carried out in less detail.

Ebene 1

Level 01:
Typification of supporting assets

At the first level, you determine which types of supporting assets are present in your organization, thus creating the framework for detailed surveys. To do this, you can select appropriate templates from the ISO 27005 standard, such as hardware, locations or people, or define your own asset types.

This subdivision enables a global risk survey and analysis to be carried out at a later date, in which all the risks relating to a certain type of asset can be viewed and treated in a bundled manner.

Ebene 2

Level 02:
Definition of relevant categories

The second step is to divide the defined asset types into categories by considering differences in the way data and information is processed or other properties. For this purpose, you list, for example, the different hardware (e.g. mobile devices, mobile storage media, peripheral devices, etc.) you are using.

This granular classification subsequently enables a finer risk assessment and thus also a more targeted and thus more effective treatment.

Ebene 2
Person vor Tafel

Level 03:
Definition of concrete assets

Finally, on the third level, you gather and look at specific supporting assets, such as your sales employee's laptops, the printer stationed in the office, or your accountant's office. This allows you to evaluate the specific protection needs and risks of each asset.

This approach allows you to take resource-saving and precise measures to protect your supporting assets.

Check mark

Standard-compliant Approach

The procedure is based on recommendations of ISO27005 and can be adapted to other standards.

Check mark

Global View

Risks that affect all supporting assets of a certaintype (e.g. fire hazard) need only be handled once.

Check mark

Flexible Level of Detail

The methodology provides guidance, but can be adapted. It is not mandatory to go through all the levels.

Risk Management

The Information Security Module offers a powerful range of features to advance risk management in your company. In risk analysis and treatment, risks are documented efficiently and get passed down onto lower levels automatically.

Risk Analysis and Treatment

  • Ziel

    Identification and
    Evaluation of Risks

    Make use of a comprehensive template catalog when gathering and documenting hazards.

  • Link

    Treatment of Risks
    with Measures

    Describe the measures you have taken to prevent hazards and the effects they have on the risks.

ISMS Module Overlay
ISMS Module Overlay

Visualization of your Compliance Infrastructure

  • Projekt Diagramm

    Illustration of Dependencies in
    the Visual Explorer

    Identify critical assets and processes thanks to a clear visualization of the inheritance of protection requirements.

  • DNA

    Synergy Effects with
    BCM and Data Protection

    Use the entered data across all modules of the Compliance Cloud for a more effective management of your IT compliance.

Monitoring and Reporting


Check mark

Continuous Monitoring

Track the introduction and improvement of measures. Open points can be coordinated via the internal task management.

Check mark

Clear Overview

Review real time key figures on your dashboard. Reports on the current implementation status can be generated individually at any time.



Help with Standards

Get support in the creation of regulatory documents (e.g. the Statement of Applicability) by importing control catalogs such as ISO27001 in order to comply with their required content structure.

Guaranteed Quality

Developed with renowned Experts

When developing products, we involve IT security officers, auditors, lawyers and other qualified experts right from the start.

Lila Struktur

Certified Development Team

Seven employees are certified Information Security Managers according to ISO 27001 and one employee is a Lead Auditor according to ISO 27001. In addition, ten Akarion employees are certified data protection officers.

What our customers say